Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks

Hong Xing, Zheng Chu, Zhiguo Ding, Arumugam Nallanathan

Research output: Journal PublicationConference articlepeer-review

33 Citations (Scopus)

Abstract

The emerging radio signal enabled simultaneous wireless information and power transfer (SWIPT), has drawn significant attention. To achieve secrecy transmission by cooperative jamming, especially in the upcoming 5G networks with self-sustainable mobile base stations (BSs) and yet not to add extra power consumption, we propose in this paper a new relay protocol, i.e., harvest-and-jam (HJ), in a relay wiretap channel with an additional set of spare helpers. Specifically, in the first transmission phase, a single-antenna transmitter (Tx) transfers signals carrying both information and energy to a multi-antenna amplify-and-forward (AF) relay and a group of multi-antenna helpers; in the second transmission phase, the AF relay processes the information and forwards it to the receiver while each of the helpers generates an artificial noise (AN), the power of which is constrained by its previously harvested energy, to interfere with the eavesdropper. By optimizing the transmit beamforming matrix for the AF relay and the covariance matrix for the AN, we maximize the secrecy rate for the receiver subject to transmit power constraints for the AF relay and all helpers. The formulated problem is shown to be non-convex, for which we propose an iterative algorithm based on alternating optimization. Finally, the performance of the proposed scheme is evaluated by simulations as compared to other heuristic schemes.

Original languageEnglish
Article number7037289
Pages (from-to)3145-3150
Number of pages6
JournalProceedings - IEEE Global Communications Conference, GLOBECOM
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event2014 IEEE Global Communications Conference, GLOBECOM 2014 - Austin, United States
Duration: 8 Dec 201412 Dec 2014

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing

Fingerprint

Dive into the research topics of 'Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks'. Together they form a unique fingerprint.

Cite this